Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Youssefdds/CVE-2024-23724 | POC Details |
| 2 | Ghost-CMS Exploit is python script. This script first performs brute-force authentication attempts using the provided wordlists. If valid credentials are found, it proceeds to check for CVE-2024-23724 vulnerability and generates an exploit payload if vulnerable. | https://github.com/gl1tch0x1/Ghost-CMS-Exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-1432 | 5.0 MEDIUM | DeepFaceLab main.py apply_xseg deserialization |
| CVE-2024-25711 | diffoscope 安全漏洞 | |
| CVE-2024-25712 | http-swagger 安全漏洞 | |
| CVE-2024-25713 | yyjson 安全漏洞 | |
| CVE-2024-25714 | Rhonabwy 安全漏洞 | |
| CVE-2024-25715 | Glewlwyd SSO server 输入验证错误漏洞 | |
| CVE-2023-52427 | Object Computing OpenDDS 安全漏洞 | |
| CVE-2023-52428 | Connect2id Nimbus JOSE+JWT 安全漏洞 | |
| CVE-2024-25718 | Samly 安全漏洞 | |
| CVE-2024-25722 | QAnything 安全漏洞 | |
| CVE-2024-25417 | flusity CMS 跨站请求伪造漏洞 | |
| CVE-2024-25418 | flusity CMS 跨站请求伪造漏洞 | |
| CVE-2024-25419 | flusity CMS 跨站请求伪造漏洞 | |
| CVE-2024-25728 | ExpressVPN 安全漏洞 |
No comments yet